Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама



Название: Digital Forensic
Автор: Nilakshi Jain, Dhananjay R. Kalbande
Издательство: Wiley
Год: 2019
Страниц: 323
Язык: английский
Формат: pdf (true)
Размер: 18.0 MB

Digital Forensic is for those who desire to learn more about investigating and fighting digital crimes. This book will also help for computer professionals who want to move into the rapidly growing security field and who are considering shifting their career focus to law enforcement and criminal investigation. It is important that computer security personnel expand their knowledge of forensic processes and keep their understanding of investigative and preventive procedures up-to-date. To complete this goal, this book covers latest challenges faced in digital forensic. This book sequentially explains disk forensic, network forensic, and memory forensic.

Procedure of altering computer hardware and software to carry out a goal is known as computer hacking. People who perform these actions and activities are often entitled as hackers. Criminalization is a social phenomenon which has drastically increased in the last few years. Crime investigation analysis is a field where digital forensic investigation plays a vital role in terms of predicting and analyzing the criminals. Digital forensic is the procedure of preservation, identification, analysis and report making of digital evidence stored as data or magnetically encoded information. The fascinating part of digital forensic is that the digital evidences are created by operating system without the knowledge of the user. The data resides in the computer in a hidden way such that only special forensic software tools and standard procedures can fetch it.

This book is written by keeping one goal in mind that a beginner, who is not much familiar regarding computer hacking, investigation methods or various forensic tools, can easily attempt these topics and recognize what we have intended to demonstrate. After reading this book, you will come to recognize that how cybercrime is affecting our everyday routine work and it can be extremely hazardous in many fields, such as institutes, societies, IT fields, etc. Moreover, after going through this book in detail, you will be capable of understanding how a hacker hacks and how you can defend yourself from these threats and how you can investigate the crime and report making. So, take care of yourself and defend yourself by hacking the cracker and be safe after that. That is, if you know how to hack a cracker, then you can know how to prevent the cracker and how to think like an investigator.
Do not hack. But when you do, it should be ethical!

Intended Audience:
One of the first questions while writing a technical book is “Who is your audience?” Keeping this question in mind at all times while writing, we have tried to keep it as simple as possible so that it will be useful to everyone who reads it. The intended audience is primarily of two types. The first type is new forensic practitioners or the students who are beginners in to the world of digital forensics. This book tries to attempt the complete compendium of all the forensic knowledge that will be needed by them to make them successful in this Forensic genre. The second type of audience are experienced digital forensics practitioners new to digital forensic investigation field.

Chapters are arranged in a sequential fashion. The following text explains summary of the topics covered in each chapter of this book:
Chapter 1 – Introduction to Computer Crimes and Ethical Hacking: This chapter provides an overview of computer crimes or cybercrimes which are growing day by day and also establish the need to enhance our forensic capabilities while working in computer network. It also explains the method of hacking as well as ethical hacking in depth. It also covers tools for performing the same.
Chapter 2 – Introduction to Digital Forensics and Digital Evidences: This chapter covers the definition of digital forensic and the scope and goals of digital forensic investigation. This chapter also includes importance of digital evidence and the areas where we can find our digital evidences.
Chapter 3 – Incidence Response Process: This chapter introduces the response strategy when any incidence occurs. Proper stepwise solutions are provided which are further explained in the succeeding chapters.
Chapter 4 – Live Data Collection: This chapter provides the path to all investigations regarding the collection of data. Specifically, how they will collect host-based evidence, network-based evidence, and other, nontechnical evidence in order to determine what happened and how the incident might be resolved. The chapter also covers how to obtain host-based information.
Chapter 5 – Forensic Duplication: This chapter discusses in depth on how to perform forensic duplications of media to collect the entire contents of a computer system.
Chapter 6 – Disk and File System Analysis: This chapter covers various types of files systems and its structure since the understanding of internal structure of the computer is also important.
Chapter 7 – Data Analysis: After we have learnt to collect information in a forensically sound manner, we must analyze or interpret that information to draw valid conclusions to investigate. This chapter includes unearthing and interpreting data on Windows and Unix systems.
Chapter 8 – Network Forensic: This chapter explains how to perform network monitoring with popular network packet-capturing programs in order to collect network-based evidence. We discuss how to obtain evidence by interviewing system administrators, managers, and other personnel when investigating a computer security incident.
Chapter 9 – Report Writing: Discusses the importance of report writing in computer forensics examinations and offers guidelines on report content, structure, and presentation; and explains how to generate report findings. In this chapter, we have included standard formats of writing investigation report with suitable demonstrations. This chapter provides the path and puts together all the information we’ve gathered in the course of the investigation to prove the prosecution’s case.
Chapter 10 – Computer Forensics Tools: This chapter explores current computer forensics software and hardware tools, including those that might not be readily available, and evaluates their strengths and weaknesses.
Appendix A – Lab Experiments: This includes lab experiments based on important topics of the book, covering mobile forensic, hacking, autopsy, etc.
Appendix B – Questions and Answers: This includes important questions with solutions related to all chapters.

Скачать Digital Forensic









НЕ РАБОТАЕТ TURBOBIT.NET? ЕСТЬ РЕШЕНИЕ, ЖМИ СЮДА!





Автор: Ingvar16 Вчера, 19:49 | Напечатать | СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.





С этой публикацией часто скачивают:
    {related-news}

Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.


 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности